Provided by: freebsd-manpages_12.2-1_all bug

NAME

     carp — Common Address Redundancy Protocol

SYNOPSIS

     device carp

DESCRIPTION

     The CARP allows multiple hosts on the same local network to share a set of IPv4 and/or IPv6
     addresses.  Its primary purpose is to ensure that these addresses are always available.

     To use carp, the administrator needs to configure at a minimum a common virtual host ID
     (vhid), and attach at least one IP address to this vhid on each machine which is to take
     part in the virtual group.  Additional parameters can also be set on a per-vhid basis:
     advbase and advskew, which are used to control how frequently the host sends advertisements
     when it is the master for a virtual host, and pass which is used to authenticate carp
     advertisements.  The advbase parameter stands for “advertisement base”.  It is measured in
     seconds and specifies the base of the advertisement interval.  The advskew parameter stands
     for “advertisement skew”.  It is measured in 1/256 of seconds.  It is added to the base
     advertisement interval to make one host advertise a bit slower that the other does.  Both
     advbase and advskew are put inside CARP advertisements.  These values can be configured
     using ifconfig(8), or through the SIOCSVH ioctl(2).

     CARP virtual hosts can be configured on multicast-capable interfaces: Ethernet, layer 2
     VLAN, FDDI and Token Ring.  An arbitrary number of virtual host IDs can be configured on an
     interface.  An arbitrary number of IPv4 or IPv6 addresses can be attached to a particular
     vhid.  It is important that all hosts participating in a vhid have the same list of prefixes
     configured on the vhid, since all the prefixes are included in the cryptographic checksum
     supplied in each advertisement.  Multiple vhids running on one interface participate in
     master/backup elections independently.

     Additionally, there are a number of global parameters which can be set using sysctl(8):

     net.inet.carp.allow                   Allow carp operation.  When disabled, virtual hosts
                                           remain in initial state, neither sending nor receiving
                                           announcements or traffic.  Enabled by default.

     net.inet.carp.preempt                 Allow virtual hosts to preempt each other.  When
                                           enabled, a vhid in a backup state would preempt a
                                           master that is announcing itself with a lower advskew.
                                           Disabled by default.

     net.inet.carp.dscp                    DSCP value in carp packet.  Valid Values are 0 to 63.
                                           A value of 4 is equivalent to the old standard of TOS
                                           LOW_DELAY.  TOS values were deprecated and replaced by
                                           DSCP in 1998.  The default value is 56 (CS7/Network
                                           Control).

     net.inet.carp.log                     Determines what events relating to carp vhids are
                                           logged.  A value of 0 disables any logging.  A value
                                           of 1 enables logging state changes of carp vhids.
                                           Values above 1 enable logging of bad carp packets.
                                           The default value is 1.

     net.inet.carp.demotion                This value shows the current level of CARP demotion.
                                           The value is added to the actual advskew sent in
                                           announcements for all vhids.  During normal system
                                           operation the demotion factor is zero.  However,
                                           problematic conditions raise its level: when carp
                                           experiences problem with sending announcements, when
                                           an interface running a vhid goes down, or while the
                                           pfsync(4) interface is not synchronized.  The demotion
                                           factor can be adjusted writing to the sysctl oid.  The
                                           signed value supplied to the sysctl(8) command is
                                           added to current demotion factor.  This allows to
                                           control carp behaviour depending on some external
                                           conditions, for example on the status of some daemon
                                           utility.

     net.inet.carp.ifdown_demotion_factor  This value is added to net.inet.carp.demotion when an
                                           interface running a vhid goes down.  The default value
                                           is 240 (the maximum advskew value).

     net.inet.carp.senderr_demotion_factor
                                           This value is added to net.inet.carp.demotion when
                                           carp experiences errors sending its announcements.
                                           The default value is 240 (the maximum advskew value).

STATE CHANGE NOTIFICATIONS

     Sometimes it is useful to get notified about carp status change events.  This can be
     accomplished by using devd(8) hooks.  Master/slave events are signalled under system CARP.
     The subsystem specifies the vhid and name of the interface where the master/slave event
     occurred.  The type of the message displays the new state of the vhid.  Please see
     devd.conf(5) and the EXAMPLES section for more information.

EXAMPLES

     For firewalls and routers with multiple interfaces, it is desirable to failover all of the
     addresses running carp together, when one of the physical interfaces goes down.  This is
     achieved by the use of the preempt option.  Enable it on both hosts A and B:

           sysctl net.inet.carp.preempt=1

     Assume that host A is the preferred master and we are running the 192.168.1.0/24 prefix on
     em0 and 192.168.2.0/24 on em1.  This is the setup for host A (advskew is above 0 so it could
     be overwritten in the emergency situation from the other host):

           ifconfig em0 vhid 1 advskew 100 pass mekmitasdigoat 192.168.1.1/24
           ifconfig em1 vhid 2 advskew 100 pass mekmitasdigoat 192.168.2.1/24

     The setup for host B is identical, but it has a higher advskew:

           ifconfig em0 vhid 1 advskew 200 pass mekmitasdigoat 192.168.1.1/24
           ifconfig em1 vhid 2 advskew 200 pass mekmitasdigoat 192.168.2.1/24

     When one of the physical interfaces of host A fails, advskew is demoted to a configured
     value on all its carp vhids.  Due to the preempt option, host B would start announcing
     itself, and thus preempt host A on both interfaces instead of just the failed one.

     Processing of carp status change events can be set up by using the following devd.conf rule:

           notify 0 {
                   match "system"          "CARP";
                   match "subsystem"       "[0-9]+@[0-9a-z]+";
                   match "type"            "(MASTER|BACKUP)";
                   action "/root/carpcontrol.sh $subsystem $type";
           };

     To see carp packets decoded in tcpdump(1) output, one needs to specify the -T carp option,
     otherwise tcpdump(1) will interpret them as VRRP packets:

           tcpdump -npi vlan0 -T carp

SEE ALSO

     tcpdump(1), inet(4), pfsync(4), devd.conf(5), rc.conf(5), ifconfig(8), sysctl(8)

HISTORY

     The carp device first appeared in OpenBSD 3.5.  The carp device was imported into
     FreeBSD 5.4.  In FreeBSD 10.0, carp was significantly rewritten, and is no longer a pseudo-
     interface.